The security of video conferencing applications

The security of video conferencing applications

April 25, 2020 Off By admin

Since the explosion of the disease around the world, people have confined themselves.

Companies to continue their activities have opted for remote work. To facilitate collaboration during telework, some applications have proved quite useful or essential. These are teleconferencing applications, or if you want video conferencing. These apps allow multiple people to exchange in real time. Among many applications of this kind, some have nevertheless distinguished themselves. These include Zoom, Skype and Teams.

This article will also interest you: Zoom: the priority of the next 90 days, user safety

However, as digital tools, perfection is not there. Unfortunately, there have been many weaknesses in computer security in some circumstances. Especially Zoom who has been at the center of a lot of scandal lately. If in the context at present we cannot do without its tools, then the aim will be to make them safer because "it is the protection of the company as a whole" noted Bremtane Moudjeb Security specialist and head of the cybersecurity branch at Cisco Switzerland.

The immersion in telework was done with a lot of haste unfortunately for many companies. And this has not been without consequences.In this regard, The specialist at Cisco Switzerland, Bremtane Moudjeb, noted this in an interview: "Because we had to go very quickly, the safety issues posed by videoconferences were not an immediate priority. The health of employees was considered more important, and rightly so. But now it's time for companies to decide how they want to approach the future. ». In other words, cybersecurity has not unfortunately been a priority from the beginning. But if it's not too late to catch up, companies need to make more effort to fill their gaps as soon as possible. Especially as telework tends to become a norm.

And the longer this situation takes, responsibilities and problems can accumulate and not mix well. "When we talk about security, the question is not really whether an employee works from home; rather, it is the protection of the company as a whole and its business model. Companies need to develop a comprehensive approach to security that maintains the stability of their processes and protects employees, even when they work outside the company's geographic scope – at a customer's home, on the go or at home. says the specialist. He added: "The security of a shared communication infrastructure must be directly linked to network security. At the same time, all of the company's systems need to be constantly updated. Strong authentication, web and DNS security, VPNs, all these tools must be part of the standard protection of companies. For all applications. ».

Returning to the issue of the safety of video conferencing tools, the most important part should be highlighted. The supplier's accident. Indeed, in order to speak of a safe and reliable tool, the publisher of its tools would have to be able to essentially include the protection of personal data good the process of designing and developing the program concerned. In other words, exchanges must be absolutely encrypted from the start. Encrypt to prevent any use of data in case of interception, also decrypt to prevent providers of these applications from being aware of the content of conversations. Taking into account the importance and sensitivity of the information involved, companies must invest in solutions that will ensure better protection. At the other end of the day, the issue of transparency is essential. Users and customers of video conferencing service providers must be informed in real time of security vulnerabilities and bugs in their programs. If the publisher manages to build trust between itself and its users, a certain step towards securing their data will be at the end.

In addition, companies' strategic choices are important in defining a secure framework for information systems. "Before they even embark on the development of a cybersecurity strategy, they must first understand and evaluate their resources, where they work and their information consumption model, and the privacy and compliance challenges associated with them. We often forget an element, which is fundamental: in the digital world, your resources, your employees and your applications must be protected on all types of devices, everywhere and constantly. Bremtane Moudjeb explained.

Now access an unlimited number of passwords:

Check out our hacking software